Network Function Virtualization. CSU CS557, Spring 2018 Instructor: Lorenzo De Carli

Size: px
Start display at page:

Download "Network Function Virtualization. CSU CS557, Spring 2018 Instructor: Lorenzo De Carli"

Transcription

1 Network Function Virtualization CSU CS557, Spring 2018 Instructor: Lorenzo De Carli

2 Managing middleboxes Middlebox manifesto (ref. previous lecture) pointed out the need for automated middlebox management Many different solutions proposed afterwards Typical model: middleboxes are virtualized software appliances Can be deployed on general-purpose servers Area typically referred to as Network Function Virtualization

3 Managing middleboxes - II Implementing middleboxes in software offers great freedom Allowing things like scaling and dynamic load balancing: Scaling Load-balancing Input traffic IDS 1 IDS3 IDS2 IDS 1 IDS2

4 Managing middleboxes - III The ability of shuffling middleboxes around creates various challenges Most are related to the stateful nature of middlebox processing E.g., an IDS keeps some detection state for each flow it is analyzing What happens to the state if the IDS is terminated or the flow is remapped to another IDS node?

5 Example: IDS MB scaled out during portscan detection All traffic processed by the same middlebox: Conn attempt #1 Scale-out mid-attack: Conn attempt #1 Conn attempt #2 IDS 1 Conn attempt #2 Conn attempt #3 IDS 1 Portscan Conn attempt #3 IDS 2

6 OpenNF OpenNF: Enabling Innovation in Network Function Control Aaron Gember-Jacobson, Raajay Viswanathan, Chaithan Prakash, Robert Grandl, Junaid Khalid, Sourav Das, and Aditya Akella University of Wisconsin-Madison ABSTRACT Network functions virtualization (NFV) together with softwaredefined networking (SDN) has the potential to help operators satisfy tight service level agreements, accurately monitor andmanipulate network traffic, and minimize operating expenses. However, in scenarios that require packet processing to be redistributed across acollectionofnetworkfunction(nf)instances,simultaneously achieving all three goals requires a framework that provides efficient, coordinated control of both internal NF state and network forwarding state. To this end, we design a control plane called OpenNF. We use carefully designed APIs and a clever combination of events and forwarding updates to address race conditions, bound overhead, and accommodate a variety of NFs. Our evaluation shows that OpenNF offers efficient state control without compromising flexibility, and requires modest additions to NFs. Categories and Subject Descriptors C.2.1 [Computer Communication Networks]: Network Architecture and Design; C.2.3 [Computer Communication Networks]: Network Operations Keywords Network functions, middleboxes, software-defined networking 1. INTRODUCTION Network functions (NFs), or middleboxes, are systems that examine and modify packets and flows in sophisticated ways: e.g., intrusion detection systems (IDSs), load balancers, caching proxies, etc. NFs play a critical role in ensuring security, improving performance, and providing other novel network functionality [37]. Recently, we have seen a growing interest in replacing dedicated NF hardware with software-based NFs running on generic compute resources a trend known as network functions virtualization (NFV) [12]. In parallel, software-defined networking (SDN) is being used to steer flows through appropriate NFs to enforce policies and jointly manage network and NF load [17, 20, 22, 26, 32]. Permission to make digital or hard copies of all or part of this workforpersonalor classroom use is granted without fee provided that copies are notmadeordistributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, orrepublish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. SIGCOMM 14, August 17 22, 2014, Chicago, IL, USA. Copyright 2014 ACM /14/08...$ Together, NFV and SDN can enable an important class of management applications that need to dynamically redistribute packet processing across multiple instances of an NF e.g., NF load balancing [32] and elastic NF scaling [21]. In the context of such applications, NFV + SDN can help achieve three important goals: (1) satisfytightservicelevelagreements(slas)onnfperformance or availability; (2) accurately monitor and manipulate network traffic, e.g., an IDS should raise alerts for all flows containing known malware; and (3) minimize NF operating costs. However, simultaneously achieving all three goals is not possible today, and fundamentally requires more control than NFV + SDN can offer. To see why, consider a scenario where an IDS is overloaded and must be scaled out in order to satisfy SLAs on throughput (Figure 1). With NFV we can easily launch a new IDS instance, and with SDN we can reroute some in-progress flows to the new instance [17, 32]. However, attacks may go undetected because the necessary internal NF state is unavailable at the new instance. To overcome this problem, an SDN control application can wait for existing flows to terminate and only reroute new flows [22, 38], but this delays the mitigation of overload and increases the likelihood of SLA violations. NF accuracy may also be impacted due to some NF-internal state not being copied or shared. In this example, the only way to avoid a trade-off between NF accuracy and performance is to allow a control application to quickly and safely move the internal IDS state for some flows from the original instance to the new instance, and update network forwarding state alongside. Similarneedsariseinthecontextofotherapplications that rely on dynamic reallocation of packet processing: e.g., rapid NF upgrades and dynamic invocation of remote processing. In this paper, we present OpenNF, a control plane architecture that provides efficient, coordinated control of both internal NF state and network forwarding state to allow quick, safe, and fine-grained reallocation of flows across NF instances. Using OpenNF, operators can create rich control applications that redistributeprocessing to optimally meet their performance, availability, security and cost objectives, thus avoiding the need to make undesirable trade-offs. We address three major challenges in designing OpenNF: C1: Addressing race conditions. This is the most basic issue that arises when reallocating in-progress flows: When some internal NF state is being moved, packets may arrive at the source instance after the move starts, or at the destination instance before the state transfer finishes. Unless care is taken, updates to NF state due to such packets may either be lost or happen out of order, violating move safety. Similarly, when state is copied across NF instances, updates occurring contemporaneously may cause state to become inconsistent. Depending on the NF, these issues may hurt its accuracy. To account for race conditions, we introduce two novel constructs: (1) an event abstraction to externally observe and prevent

7 Core problems Middleboxes tend to maintain state pertaining to the traffic they are processing Contrast to routers, switches etc. which do not need to remember anything besides the packet they are processing Problem: what happens to this state if processing switches to another middlebox?

8 OpenNF contributions Mechanism to coordinate scaling and load-balancing of middleboxes without service interruption Based on state-transfer mechanism which can provide various useful properties (no packet lost/reordered) Helps ensuring correctness (no state is lost/corrupted due to scaling/load-balancing) Architecture to coordinate state transfer operations

9 Relocating network functions Transferring network functions w/o service interruption requires coordination of: Application-level state transfer: NF controller transfers state related to flows being redirected by the network level Network-level flow-steering: SDN controller redirects flows from source to destination middlebox (already provided by standard OpenFlow network substrate)

10 OpenNF high-level architecture Initiates/manages high-level operations (scaling, load-balancing, replication) Performs NF state transfer Performs flow steering

11 High-level functions to state manipulation operations Goal: perform load-balancing by relocating a set of flows S from middlebox A to B: Move state for flows in S from A to B Steer flows in S so that they traverse B instead of A Goal: perform scaling by terminating middlebox A and relocating its processing task to B Same as above but at the end A is terminated Goal: replicate a middlebox A1 to another middlebox A2 to provide a hot spare Instantiate A2 Periodically copy state for the set of flows S managed by A1 to A2

12 State manipulation operations to low-level operations Northbound API: move(srcinst, dstinst, filter, scope, properties) copy(srcinst, dstinst, filter, scope) share(list<inst>, filter, scope, consistency) NFV controller: implements copy/move/share operations by issuing appropriate sequences of low-level Southbound API calls Southbound API: getperflow(), putperflow(), delperflow(), getmultiflow(), putmultiflow(), delmultiflow(), getallflows(), delallflows(), enableevents(), disableevents()

13 Types of state Per-flow state: program state keeping track of properties of a single network flow Multi-flow state: program state keeping track of aggregate properties of multiple flows All-flow state: program state keeping track of global properties of middlebox processing (information referring to and/or affecting all flows being processed)

14 OpenNF: move operation Can provide various properties (loss-freeness, order preservation) Trade off: correctness vs delay Simplest case: move w/o guarantees: 4.Reconfigure forwarding table State SDN controller 1.getPerflow(F) 3.putPerflow(F) 2.delPerflow(F) OpenFlow switch Flow of interest MBSRC State Flow of interest MBDST State

15 Move w/o guarantees: issues State created in MBSRC for packets arrived after getperflow is not moved to MBDST Simplest solution: instruct MBSRC (or SDN switch) to ignore (or drop) all packets received after getperflow Only OK if processing is resilient to packet losses and still suboptimal! E.g. IDS will continue to function but may miss attacks (e.g. portscans) OpenNF can provide additional guarantees: loss-freeness, in-order delivery

16 Loss-free move Leverage a novel OpenNF contribution: the event management API Allows NFV controller to instruct middleboxes to process, buffer, or drop certain categories of packets while at the same time forwarding the same packets to the NFV controller In loss-free move, these primitives are used to buffer and then forward all packets received by MBSRC after state has been moved, to MBDST

17 Loss-free move - part I State Packets SDN controller Flow of interest 1.enableEvents(F, drop) 2.getPerflow(F) 3.delPerflow(F) OpenFlow switch Flow of interest MBSRC State MBDST

18 Loss-free move - part II State 5.Reconfigure forwarding table Packets Flow of interest SDN controller 4.putPerflow(F) Flow of interest OpenFlow switch Flow of interest Flow of interest MBSRC MBDST Issue: packets may still arrive out-of-order at MBDST (why?) State

19 OpenNF: copy operation Copy: used e.g. for failure recovery (copy state from an active middle box to a backup instance) Uses getperflow/putperflow (no deletion) Provides eventual consistency

20 OpenNF: share operation MB1 MB2 Switch... MBN Share: used to ensure that all state updates by a middlebox are directly reflected by the state of one or more other middleboxes (distributed processing) Strict consistency: state updates to a middlebox state are immediately reflected in the state of all other middleboxes (updates to the shared state reflects the order in which packets where received by switch) Strong consistency: order of state updates may differ from the order in which packets where received by switch/but all updates performed by an individual middlebox must be seen by other middleboxes in the order in which they were performed

21 Results Total Time (ms) Per-Packet Latency Increase (ms) (a) Total move time Average NG NG PL LF PL LF PL+ER LF+OP PL+ER Maximum (b) Per-packet latency increase Figure 10: Efficiency of move with no guarantees (NG), loss-free (LF), and loss-free and order-preserving (LF+OP) with and without parallelizing (PL) and early-release (ER) optimizations; traffic rate is 2500 packets/sec; times are averaged over 5 runs and the error bars show 95% confidence intervals

22 Results - II # Dropped Packets flows 500 flows 1000 flows Packet Rate (1000s of pkts/s) (a) Packet drops during a parallelized move with no guarantees Move Time (ms) flows 500 flows 1000 flows Packet Rate (1000s of pkts/s) (b) Total time for a parallelized loss-free move Figure 11: Impact of packet rate and number of per-flows states on parallelized move with and without a loss-free guarantee

23 Other challenges in middlebox management Designing policy languages to describe middlebox deployments Offloading middleboxes to the cloud

OpenNF: Enabling Innovation in Network Function Control

OpenNF: Enabling Innovation in Network Function Control OpenNF: Enabling Innovation in Network Function Control Aaron Gember-Jacobson, Raajay Viswanathan, Chaithan Prakash, Robert Grandl, Junaid Khalid, Sourav Das, and Aditya Akella University of Wisconsin-Madison

More information

OpenNF: Enabling Innovation in Network Function Control

OpenNF: Enabling Innovation in Network Function Control OpenNF: Enabling Innovation in Network Function Control Aaron Gember-Jacobson, Raajay Viswanathan, Chaithan Prakash, Robert Grandl, Junaid Khalid, Sourav Das, and Aditya Akella University of Wisconsin-Madison

More information

OpenNF: Enabling Innova2on in Network Func2on Control Aditya Akella

OpenNF: Enabling Innova2on in Network Func2on Control Aditya Akella OpenNF: Enabling Innova2on in Network Func2on Control Aditya Akella With: Aaron Gember, Raajay Vishwanathan, Chaithan Prakash, Sourav Das, Robert Grandl, and Junaid Khalid Network func2ons, or Middleboxes

More information

Network function virtualization

Network function virtualization Network function virtualization Ankit Singla ETH Zürich Spring 2017 News from SIGCOMM 2017 36 papers (out of 250 submissions) On every topic we covered / will cover 2 papers from ETH! 2 An update Beyond

More information

COCONUT: Seamless Scale-out of Network Elements

COCONUT: Seamless Scale-out of Network Elements COCONUT: Seamless Scale-out of Network Elements Soudeh Ghorbani P. Brighten Godfrey University of Illinois at Urbana-Champaign Simple abstractions Firewall Loadbalancer Router Network operating system

More information

Improving the Safety, Scalability, and Efficiency of Network Function State Transfers

Improving the Safety, Scalability, and Efficiency of Network Function State Transfers Improving the Safety, Scalability, and Efficiency of Network Function State Transfers Aaron Gember-Jacobson and Aditya Akella University of Wisconsin-Madison {agember,akella}@cs.wisc.edu ABSTRACT Several

More information

Middleboxes. CSU CS557 - Fall 2017 Instructor: Lorenzo De Carli

Middleboxes. CSU CS557 - Fall 2017 Instructor: Lorenzo De Carli Middleboxes CSU CS557 - Fall 2017 Instructor: Lorenzo De Carli What is a middlebox? Middlebox : networking parlance for any network device which performs analysis and/or transformation of application-level

More information

A Ten Minute Introduction to Middleboxes. Justine Sherry, UC Berkeley

A Ten Minute Introduction to Middleboxes. Justine Sherry, UC Berkeley A Ten Minute Introduction to Middleboxes Justine Sherry, UC Berkeley This Talk: Three Questions! What is a middlebox? What are some recent trends in middlebox engineering? What research challenges do middleboxes

More information

Design and Implementation of a Framework for Software-Defined Middlebox Networking

Design and Implementation of a Framework for Software-Defined Middlebox Networking Design and Implementation of a Framework for Software-Defined Middlebox Networking Aaron Gember, Robert Grandl, Junaid Khalid, Shan-Hsiang Shen, Aditya Akella University of Wisconsin-Madison, Madison,

More information

Using SDN and NFV to Realize a Scalable and Resilient Omni-Present Firewall

Using SDN and NFV to Realize a Scalable and Resilient Omni-Present Firewall Institute of Computer Science Chair of Communication Networks Prof. Dr.-Ing. P. Tran-Gia Using SDN and NFV to Realize a Scalable and Resilient Omni-Present Firewall comnet.informatik.uni-wuerzburg.de SarDiNe

More information

Enable Infrastructure Beyond Cloud

Enable Infrastructure Beyond Cloud Enable Infrastructure Beyond Cloud Tim Ti Senior Vice President R&D July 24, 2013 The Ways of Communication Evolve Operator s challenges Challenge 1 Revenue Growth Slow Down Expense rate device platform

More information

Building Security Services on top of SDN

Building Security Services on top of SDN Building Security Services on top of SDN Gregory Blanc Télécom SudParis, IMT 3rd FR-JP Meeting on Cybersecurity WG7 April 25th, 2017 Keio University Mita Campus, Tokyo Table of Contents 1 SDN and NFV as

More information

TCP Goes to Hollywood

TCP Goes to Hollywood TCP Goes to Hollywood Stephen McQuistin and Colin Perkins University of Glasgow Marwan Fayed University of Stirling Multimedia Applications Significant and growing percentage of all Internet traffic 90000

More information

Policy-preserving Middlebox Placement in SDN-Enabled Data Centers

Policy-preserving Middlebox Placement in SDN-Enabled Data Centers Policy-preserving Middlebox Placement in SDN-Enabled Data Centers Bin Tang Computer Science Department California State University Dominguez Hills Some slides are from www.cs.berkeley.edu/~randy/courses/cs268.f08/lectures/22-

More information

Application Delivery Using SDN

Application Delivery Using SDN Application Delivery Using SDN Project Leader: Subharthi Paul Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides and audio/video recordings are available at: 1 Northbound

More information

15-744: Computer Networking. Middleboxes and NFV

15-744: Computer Networking. Middleboxes and NFV 15-744: Computer Networking Middleboxes and NFV Middleboxes and NFV Overview of NFV Challenge of middleboxes Middlebox consolidation Outsourcing middlebox functionality Readings: Network Functions Virtualization

More information

Including location-based services, IoT, and increasing personalization... Service models and delivery architectures

Including location-based services, IoT, and increasing personalization... Service models and delivery architectures Outline Service landscape Example services Including location-based services, IoT, and increasing personalization... Service models and delivery architectures Client-server, p2p, one-to-many E.g., middleboxes/proxies,

More information

Sweet Little Lies: Fake Topologies for Flexible Routing

Sweet Little Lies: Fake Topologies for Flexible Routing Sweet Little Lies: Fake Topologies for Flexible Routing Stefano Vissicchio University of Louvain HotNets 27th October 2014 Joint work with Laurent Vanbever (Princeton) and Jennifer Rexford (Princeton)

More information

Application of SDN: Load Balancing & Traffic Engineering

Application of SDN: Load Balancing & Traffic Engineering Application of SDN: Load Balancing & Traffic Engineering Outline 1 OpenFlow-Based Server Load Balancing Gone Wild Introduction OpenFlow Solution Partitioning the Client Traffic Transitioning With Connection

More information

OpenADN: A Case for Open Application Delivery Networking

OpenADN: A Case for Open Application Delivery Networking OpenADN: A Case for Open Application Delivery Networking Subharthi Paul, Raj Jain, Jianli Pan Washington University in Saint Louis {Pauls, jain, jp10}@cse.wustl.edu International Conference on Computer

More information

Lecture 10.1 A real SDN implementation: the Google B4 case. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 10.1 A real SDN implementation: the Google B4 case. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 10.1 A real SDN implementation: the Google B4 case Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it WAN WAN = Wide Area Network WAN features: Very expensive (specialized high-end

More information

arxiv: v2 [cs.ni] 16 Oct 2018

arxiv: v2 [cs.ni] 16 Oct 2018 Correctness and Performance for Stateful Chained Network Functions Junaid Khalid Aditya Akella University of Wisconsin - Madison arxiv:1612.01497v2 [cs.ni] 16 Oct 2018 Abstract: Network functions virtualization

More information

Introduction of the SONATA project / Distributed VNF State Management

Introduction of the SONATA project / Distributed VNF State Management Introduction of the SONATA project / Distributed VNF State Management Manuel Peuster, Sevil Mehraghdam, Holger Karl 27.10.2015 Computer Networks Group Universität Paderborn Agenda Marketing: The 5G-PPP

More information

Software-Defined Networking (SDN) Overview

Software-Defined Networking (SDN) Overview Reti di Telecomunicazione a.y. 2015-2016 Software-Defined Networking (SDN) Overview Ing. Luca Davoli Ph.D. Student Network Security (NetSec) Laboratory davoli@ce.unipr.it Luca Davoli davoli@ce.unipr.it

More information

MASERGY S MANAGED SD-WAN

MASERGY S MANAGED SD-WAN MASERGY S MANAGED New Performance Options for Hybrid Networks Business Challenges WAN Ecosystem Features and Benefits Use Cases INTRODUCTION Organizations are leveraging technology to transform the way

More information

Stateless Network Functions:

Stateless Network Functions: Stateless Network Functions: Breaking the Tight Coupling of State and Processing Murad Kablan, Azzam Alsudais, Eric Keller, Franck Le University of Colorado IBM Networks Need Network Functions Firewall

More information

Exploiting ICN for Flexible Management of Software-Defined Networks

Exploiting ICN for Flexible Management of Software-Defined Networks Exploiting ICN for Flexible Management of Software-Defined Networks Mayutan Arumaithurai, Jiachen Chen, Edo Monticelli, Xiaoming Fu and K. K. Ramakrishnan * University of Goettingen, Germany * University

More information

HEX Switch: Hardware-assisted security extensions of OpenFlow

HEX Switch: Hardware-assisted security extensions of OpenFlow HEX Switch: Hardware-assisted security extensions of OpenFlow Taejune Park / KAIST / taejune.park@kaist.ac.kr Zhaoyan Xu / StackRox Inc. / z@stackrox.com Seungwon Shin / KAIST / claude@kaist.ac.kr Software-Defined

More information

Piggybacking Network Functions on SDN Reactive Routing: A Feasibility Study

Piggybacking Network Functions on SDN Reactive Routing: A Feasibility Study Piggybacking Network Functions on SDN Reactive Routing: A Feasibility Study Chang Liu *, Arun Raghuramu *, Chen-Nee Chuah *, and Balachander Krishnamurthy ** * University of California, Davis; **AT&T Labs-Research

More information

Enabling Efficient and Scalable Zero-Trust Security

Enabling Efficient and Scalable Zero-Trust Security WHITE PAPER Enabling Efficient and Scalable Zero-Trust Security FOR CLOUD DATA CENTERS WITH AGILIO SMARTNICS THE NEED FOR ZERO-TRUST SECURITY The rapid evolution of cloud-based data centers to support

More information

Evaluating Cloud Storage Strategies. James Bottomley; CTO, Server Virtualization

Evaluating Cloud Storage Strategies. James Bottomley; CTO, Server Virtualization Evaluating Cloud Storage Strategies James Bottomley; CTO, Server Virtualization Introduction to Storage Attachments: - Local (Direct cheap) SAS, SATA - Remote (SAN, NAS expensive) FC net Types - Block

More information

ProgrammableFlow: OpenFlow Network Fabric

ProgrammableFlow: OpenFlow Network Fabric ProgrammableFlow: OpenFlow Network Fabric Samrat Ganguly, PhD NEC Corpora)on of America Page 1 Introducing ProgrammableFlow Software Defined Network Suite First OpenFlow-enabled network fabric Design,

More information

SOFTWARE DEFINED NETWORKS. Jonathan Chu Muhammad Salman Malik

SOFTWARE DEFINED NETWORKS. Jonathan Chu Muhammad Salman Malik SOFTWARE DEFINED NETWORKS Jonathan Chu Muhammad Salman Malik Credits Material Derived from: Rob Sherwood, Saurav Das, Yiannis Yiakoumis AT&T Tech Talks October 2010 (available at:www.openflow.org/wk/images/1/17/openflow_in_spnetworks.ppt)

More information

De-dupe: It s not a question of if, rather where and when! What to Look for and What to Avoid

De-dupe: It s not a question of if, rather where and when! What to Look for and What to Avoid De-dupe: It s not a question of if, rather where and when! What to Look for and What to Avoid By Greg Schulz Founder and Senior Analyst, the StorageIO Group Author The Green and Virtual Data Center (CRC)

More information

Bringing SDN to the Internet, one exchange point at the time

Bringing SDN to the Internet, one exchange point at the time Bringing SDN to the Internet, one exchange point at the time Joint work with: Arpit Gupta, Muhammad Shahbaz, Sean P. Donovan, Russ Clark, Brandon Schlinker, E. Katz-Bassett, Nick Feamster, Jennifer Rexford

More information

SDN Technologies Primer: Revolution or Evolution in Architecture?

SDN Technologies Primer: Revolution or Evolution in Architecture? There is no single, clear definition of softwaredefined networking (SDN), but there are two sets of beliefs centralized control and management of packet forwarding vs. a distributed architecture. This

More information

Making Network Functions Software-Defined

Making Network Functions Software-Defined Making Network Functions Software-Defined Yotam Harchol VMware Research / The Hebrew University of Jerusalem Joint work with Anat Bremler-Barr and David Hay Appeared in ACM SIGCOMM 2016 THE HEBREW UNIVERSITY

More information

Aaron Gember-Jacobson

Aaron Gember-Jacobson Aaron Gember-Jacobson http://aaron.gember-jacobson.com Contact Information Department of Computer Science, Colgate University agemberjacobson@colgate.edu 13 Oak Drive, Hamilton, NY 13346 (315) 228-6298

More information

Pasiruoškite ateičiai: modernus duomenų centras. Laurynas Dovydaitis Microsoft Azure MVP

Pasiruoškite ateičiai: modernus duomenų centras. Laurynas Dovydaitis Microsoft Azure MVP Pasiruoškite ateičiai: modernus duomenų centras Laurynas Dovydaitis Microsoft Azure MVP 2016-05-17 Tension drives change The datacenter today Traditional datacenter Tight coupling between infrastructure

More information

Deliver Office 365 Without Compromise Ensure successful deployment and ongoing manageability of Office 365 and other SaaS apps

Deliver Office 365 Without Compromise Ensure successful deployment and ongoing manageability of Office 365 and other SaaS apps Use Case Brief Deliver Office 365 Without Compromise Ensure successful deployment and ongoing manageability of Office 365 and other SaaS apps Overview Cloud-hosted collaboration and productivity suites

More information

WAN Application Infrastructure Fueling Storage Networks

WAN Application Infrastructure Fueling Storage Networks WAN Application Infrastructure Fueling Storage Networks Andrea Chiaffitelli, AT&T Ian Perez-Ponce, Cisco SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies

More information

Deep Packet Inspection of Next Generation Network Devices

Deep Packet Inspection of Next Generation Network Devices Deep Packet Inspection of Next Generation Network Devices Prof. Anat Bremler-Barr IDC Herzliya, Israel www.deepness-lab.org This work was supported by European Research Council (ERC) Starting Grant no.

More information

BUILDING A NEXT-GENERATION FIREWALL

BUILDING A NEXT-GENERATION FIREWALL How to Add Network Intelligence, Security, and Speed While Getting to Market Faster INNOVATORS START HERE. EXECUTIVE SUMMARY Your clients are on the front line of cyberspace and they need your help. Faced

More information

Toward Software-Defined Middlebox Networking

Toward Software-Defined Middlebox Networking Toward Software-Defined Middlebox Networking Aaron Gember, Prathmesh Prabhu, Zainab Ghadiyali, Aditya Akella University of Wisconsin-Madison, Madison, WI, USA {agember,pprabhu,zainab,akella}@cs.wisc.edu

More information

Phil Dredger Global Lead Network Services Cloud Platform and ITO DXC. Presentation title here edit on Slide Master

Phil Dredger Global Lead Network Services Cloud Platform and ITO DXC. Presentation title here edit on Slide Master NETWORK ON THE EDGE 1 1. 1. 2 0 1 7 Phil Dredger Global Lead Network Services Cloud Platform and ITO DXC 2017 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and

More information

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview STRATEGIC WHITE PAPER Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview Abstract Cloud architectures rely on Software-Defined Networking

More information

SDX: A Software Defined Internet Exchange

SDX: A Software Defined Internet Exchange SDX: A Software Defined Internet Exchange @SIGCOMM 2014 Laurent Vanbever Princeton University FGRE Workshop (Ghent, iminds) July, 8 2014 The Internet is a network of networks, referred to as Autonomous

More information

Symantec Protection Suite Add-On for Hosted Security

Symantec Protection Suite Add-On for Hosted  Security Symantec Protection Suite Add-On for Hosted Email Security Overview Malware and spam pose enormous risk to the health and viability of IT networks. Cyber criminal attacks are focused on stealing money

More information

ONUG SDN Federation/Operability

ONUG SDN Federation/Operability ONUG SDN Federation/Operability Orchestration A white paper from the ONUG SDN Federation/Operability Working Group May, 2016 Definition of Open Networking Open networking is a suite of interoperable software

More information

Cato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief

Cato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief Cato Cloud Software-defined and cloud-based secure enterprise network Solution Brief Legacy WAN and Security Appliances are Incompatible with the Modern Enterprise Cato Networks: Software-defined and Cloud-based

More information

Simplified service creation and delivery. Branch. SOHO Data Center. Control Center / NOC Packet Muse Service & Network Applications

Simplified service creation and delivery. Branch. SOHO Data Center. Control Center / NOC Packet Muse Service & Network Applications ElastiNET FOR SERVICE PROVIDERS DEAL CONFIDENTLY WITH A CHANGING WORLD In today s world change is the only constant. Enabling technologies are changing, as is competition and customer expectations. Service

More information

A Unified Control and Optimization Framework for Dynamical Service Chaining in Software-Defined NFV System

A Unified Control and Optimization Framework for Dynamical Service Chaining in Software-Defined NFV System R e c o n f i g u r a b l e Software Defined Radio in 5G Mobile Communication Systems A Unified Control and Optimization Framework for Dynamical Service Chaining in Software-Defined NFV System Yong Li,

More information

Scalable Network Function Virtualization for Heterogeneous Middleboxes

Scalable Network Function Virtualization for Heterogeneous Middleboxes Scalable Network Function Virtualization for Heterogeneous Middleboxes Xuzhi Zhang, Xiaozhe Shao, George Provelengios, Naveen Kumar Dumpala, Lixin Gao, and Russell Tessier University of Massachusetts,

More information

Switched Network Latency Problems Solved

Switched Network Latency Problems Solved 1 Switched Network Latency Problems Solved A Lightfleet Whitepaper by the Lightfleet Technical Staff Overview The biggest limiter to network performance is the control plane the array of processors and

More information

The Function Placement Problem (FPP)

The Function Placement Problem (FPP) Chair of Communication Networks Department of Electrical and Computer Engineering Technical University of Munich The Function Placement Problem (FPP) Wolfgang Kellerer Technical University of Munich Dagstuhl,

More information

The Top Five Reasons to Deploy Software-Defined Networks and Network Functions Virtualization

The Top Five Reasons to Deploy Software-Defined Networks and Network Functions Virtualization The Top Five Reasons to Deploy Software-Defined Networks and Network Functions Virtualization May 2014 Prepared by: Zeus Kerravala The Top Five Reasons to Deploy Software-Defined Networks and Network Functions

More information

Using Flexibility as a Measure to Evaluate Softwarized Networks

Using Flexibility as a Measure to Evaluate Softwarized Networks Chair of Communication Networks Department of Electrical and Computer Engineering Technical University of Munich Using Flexibility as a Measure to Evaluate Softwarized Networks Wolfgang Kellerer Technical

More information

TriScale Clustering Tech Note

TriScale Clustering Tech Note TriScale Clustering Tech Note www.citrix.com Table of Contents Expanding Capacity with TriScale Clustering... 2 How Clustering Works... 2 Cluster Communication... 3 Cluster Configuration and Synchronization...

More information

Transport Software Defined Networking: Part 1 Grabbing the Low-Hanging Fruit

Transport Software Defined Networking: Part 1 Grabbing the Low-Hanging Fruit Advisory Report Transport Software Defined Networking: Part 1 Grabbing the Low-Hanging Fruit February 27, 2013 Rick Talbot Current Analysis Senior Analyst, Transport and Routing Infrastructure Contents

More information

MapReduce & HyperDex. Kathleen Durant PhD Lecture 21 CS 3200 Northeastern University

MapReduce & HyperDex. Kathleen Durant PhD Lecture 21 CS 3200 Northeastern University MapReduce & HyperDex Kathleen Durant PhD Lecture 21 CS 3200 Northeastern University 1 Distributing Processing Mantra Scale out, not up. Assume failures are common. Move processing to the data. Process

More information

Raj Jain (Washington University in Saint Louis) Mohammed Samaka (Qatar University)

Raj Jain (Washington University in Saint Louis) Mohammed Samaka (Qatar University) APPLICATION DEPLOYMENT IN FUTURE GLOBAL MULTI-CLOUD ENVIRONMENT Raj Jain (Washington University in Saint Louis) Mohammed Samaka (Qatar University) GITMA 2015 Conference, St. Louis, June 23, 2015 These

More information

Business Benefits of Policy Based Data De-Duplication Data Footprint Reduction with Quality of Service (QoS) for Data Protection

Business Benefits of Policy Based Data De-Duplication Data Footprint Reduction with Quality of Service (QoS) for Data Protection Data Footprint Reduction with Quality of Service (QoS) for Data Protection By Greg Schulz Founder and Senior Analyst, the StorageIO Group Author The Green and Virtual Data Center (Auerbach) October 28th,

More information

How Teridion Works. A Teridion Technical Paper. A Technical Overview of the Teridion Virtual Network. Teridion Engineering March 2017

How Teridion Works. A Teridion Technical Paper. A Technical Overview of the Teridion Virtual Network. Teridion Engineering March 2017 A Teridion Technical Paper How Teridion Works A Technical Overview of the Teridion Virtual Network Teridion Engineering March 2017 Learn more at teridion.com Introduction Sub-second application response

More information

Elastic Scaling of Stateful Network Functions

Elastic Scaling of Stateful Network Functions NSDI 2018 Elastic Scaling of Stateful Network Functions Shinae Woo *+, Justine Sherry *, Sangjin Han *, Sue Moon +, Sylvia Ratnasamy *, Scott Shenker * + KAIST, * UC Berkeley Elastic Scaling of NFs NFV

More information

SDN-enabled Internet Exchange Point

SDN-enabled Internet Exchange Point SDN-enabled Internet Exchange Point Muhammad Shahbaz Georgia Tech Internet2 Innovation Award Joint collaboration with: Arpit Gupta, Laurent Vanbever, Hyojoon Kim, Sean Donovan, Russ Clark, Nick Feamster,

More information

ETSI FUTURE Network SDN and NFV for Carriers MP Odini HP CMS CT Office April 2013

ETSI FUTURE Network SDN and NFV for Carriers MP Odini HP CMS CT Office April 2013 ETSI FUTURE Network SDN and NFV for Carriers MP Odini HP CMS CT Office April 2013 Challenges and Opportunities Reduce Capex/Opex Challenges Innovation at devices and OTT side Number of devices explode

More information

The Time For IT Resilience Is NOW

The Time For IT Resilience Is NOW White Paper The Time For IT Resilience Is NOW Executive Summary Cloud backup and cloud storage/syncing services are popular because they store data in the cloud, and you can access and restore your data

More information

Research on Firewall in Software Defined Network

Research on Firewall in Software Defined Network Advances in Computer, Signals and Systems (2018) 2: 1-7 Clausius Scientific Press, Canada Research on Firewall in Software Defined Cunqun Fan a, Manyun Lin, Xiangang Zhao, Lizi Xie, Xi Zhang b,* National

More information

CA ERwin Data Modeler s Role in the Relational Cloud. Nuccio Piscopo.

CA ERwin Data Modeler s Role in the Relational Cloud. Nuccio Piscopo. CA ERwin Data Modeler s Role in the Relational Cloud Nuccio Piscopo Table of Contents Abstract.....3 Introduction........3 Daas requirements through CA ERwin Data Modeler..3 CA ERwin in the Relational

More information

SCALING SOFTWARE DEFINED NETWORKS. Chengyu Fan (edited by Lorenzo De Carli)

SCALING SOFTWARE DEFINED NETWORKS. Chengyu Fan (edited by Lorenzo De Carli) SCALING SOFTWARE DEFINED NETWORKS Chengyu Fan (edited by Lorenzo De Carli) Introduction Network management is driven by policy requirements Network Policy Guests must access Internet via web-proxy Web

More information

OpenADN: Service Chaining of Globally Distributed VNFs

OpenADN: Service Chaining of Globally Distributed VNFs OpenADN: Service Chaining of Globally Distributed VNFs Project Leader: Subharthi Paul Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Software Telco Congress, Santa Clara,

More information

Deliver Office 365 Without Compromise

Deliver Office 365 Without Compromise USE CASE BRIEF Deliver Office 365 Without Compromise Ensure successful deployment and ongoing manageability of Office 365 and other SaaS apps Cloud-hosted collaboration and productivity suites like Office

More information

Casa Systems Axyom Multiservice Router

Casa Systems Axyom Multiservice Router Solution Brief Casa Systems Axyom Multiservice Router Solving the Edge Network Challenge To keep up with broadband demand, service providers have used proprietary routers to grow their edge networks. Cost

More information

PNUTS: Yahoo! s Hosted Data Serving Platform. Reading Review by: Alex Degtiar (adegtiar) /30/2013

PNUTS: Yahoo! s Hosted Data Serving Platform. Reading Review by: Alex Degtiar (adegtiar) /30/2013 PNUTS: Yahoo! s Hosted Data Serving Platform Reading Review by: Alex Degtiar (adegtiar) 15-799 9/30/2013 What is PNUTS? Yahoo s NoSQL database Motivated by web applications Massively parallel Geographically

More information

Web-Based User Interface for the Floodlight SDN Controller

Web-Based User Interface for the Floodlight SDN Controller 3175 Web-Based User Interface for the Floodlight SDN Controller Hakan Akcay Department of Computer Engineering, Istanbul University, Istanbul Email: hknakcay@gmail.com Derya Yiltas-Kaplan Department of

More information

WHITE PAPER. Applying Software-Defined Security to the Branch Office

WHITE PAPER. Applying Software-Defined Security to the Branch Office Applying Software-Defined Security to the Branch Office Branch Security Overview Increasingly, the branch or remote office is becoming a common entry point for cyber-attacks into the enterprise. Industry

More information

Innovative Solutions. Trusted Performance. Intelligently Engineered. Comparison of SD WAN Solutions. Technology Brief

Innovative Solutions. Trusted Performance. Intelligently Engineered. Comparison of SD WAN Solutions. Technology Brief Innovative. Trusted Performance. Intelligently Engineered. Comparison of SD WAN Technology Brief Comparison of SD WAN SD-WAN Overview By the end of 2019, 30% of enterprises will use SD-WAN products in

More information

ADVANCED SECURITY MECHANISMS TO PROTECT ASSETS AND NETWORKS: SOFTWARE-DEFINED SECURITY

ADVANCED SECURITY MECHANISMS TO PROTECT ASSETS AND NETWORKS: SOFTWARE-DEFINED SECURITY ADVANCED SECURITY MECHANISMS TO PROTECT ASSETS AND NETWORKS: SOFTWARE-DEFINED SECURITY One of the largest concerns of organisations is how to implement and introduce advanced security mechanisms to protect

More information

10 Steps to Virtualization

10 Steps to Virtualization AN INTEL COMPANY 10 Steps to Virtualization WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY Virtualization the creation of multiple virtual machines (VMs) on a single piece of hardware, where

More information

Proceedings of the Fourth Engineering Students Conference at Peradeniya (ESCaPe) SDN Flow Caching

Proceedings of the Fourth Engineering Students Conference at Peradeniya (ESCaPe) SDN Flow Caching Proceedings of the Fourth Engineering Students Conference at Peradeniya (ESCaPe) 2016 SDN Flow Caching N.B.U.S. Nanayakkara, R.M.L.S. Bandara, N.B. Weerasinghe, S,N, Karunarathna Department of Computer

More information

Scotch: Elastically Scaling up SDN Control-Plane using vswitch based Overlay

Scotch: Elastically Scaling up SDN Control-Plane using vswitch based Overlay Scotch: Elastically Scaling up SDN Control-Plane using vswitch based Overlay An Wang George Mason University awang1@gmu.edu T. V. Lakshman Bell Labs, Alcatel-Lucent T.V.Lakshman@alcatellucent.com Yang

More information

Making Middleboxes Someone Else s Problem: Network Processing as a Cloud Service

Making Middleboxes Someone Else s Problem: Network Processing as a Cloud Service Making Middleboxes Someone Else s Problem: Network Processing as a Cloud Service Justine Sherry*, Shaddi Hasan*, Colin Scott*, Arvind Krishnamurthy, Sylvia Ratnasamy*, and Vyas Sekar * Typical Enterprise

More information

Specifying and Placing Chains of Virtual Network Functions

Specifying and Placing Chains of Virtual Network Functions Specifying and Placing Chains of Virtual Network Functions Sevil Mehraghdam, Matthias Keller, and Holger Karl 2014 IEEE 3rd International Conference on Cloud Networking (CloudNet) Speaker: Tao Gao 2018-02-16

More information

Juniper Networks Live-Live Technology

Juniper Networks Live-Live Technology Juniper Networks Live-Live Technology Increasing Resiliency 1 Table of Contents Executive Summary... 3 Introduction... 3 Resiliency Challenges... 3 Juniper s Live-Live Solution...4 Live-Live...4 How MoFRR

More information

Stratos: Virtual Middleboxes as First-Class Entities

Stratos: Virtual Middleboxes as First-Class Entities Stratos: Virtual Middleboxes as First-Class Entities Aaron Gember Robert Grandl Ashok Anand Theophilus Benson Aditya Akella University of Wisconsin Madison {agember,rgrandl,tbenson,akella}@cs.wisc.edu

More information

How Teridion Works. A Teridion Technical Paper. A Technical Overview of the Teridion Virtual Network. Teridion Engineering May 2017

How Teridion Works. A Teridion Technical Paper. A Technical Overview of the Teridion Virtual Network. Teridion Engineering May 2017 A Teridion Technical Paper How Teridion Works A Technical Overview of the Teridion Virtual Network Teridion Engineering May 2017 Learn more at teridion.com Introduction Sub-second application response

More information

SOLUTION BRIEF NETWORK OPERATIONS AND ANALYTICS. How Can I Predict Network Behavior to Provide for an Exceptional Customer Experience?

SOLUTION BRIEF NETWORK OPERATIONS AND ANALYTICS. How Can I Predict Network Behavior to Provide for an Exceptional Customer Experience? SOLUTION BRIEF NETWORK OPERATIONS AND ANALYTICS How Can I Predict Network Behavior to Provide for an Exceptional Customer Experience? SOLUTION BRIEF CA DATABASE MANAGEMENT FOR DB2 FOR z/os DRAFT When used

More information

Datacenter replication solution with quasardb

Datacenter replication solution with quasardb Datacenter replication solution with quasardb Technical positioning paper April 2017 Release v1.3 www.quasardb.net Contact: sales@quasardb.net Quasardb A datacenter survival guide quasardb INTRODUCTION

More information

[ 7.2.5] Certain challenges arise in realizing SAS or messagepassing programming models. Two of these are input-buffer overflow and fetch deadlock.

[ 7.2.5] Certain challenges arise in realizing SAS or messagepassing programming models. Two of these are input-buffer overflow and fetch deadlock. Buffering roblems [ 7.2.5] Certain challenges arise in realizing SAS or messagepassing programming models. Two of these are input-buffer overflow and fetch deadlock. Input-buffer overflow Suppose a large

More information

The Virtual Machine Aware SAN

The Virtual Machine Aware SAN The Virtual Machine Aware SAN What You Will Learn Virtualization of the data center, which includes servers, storage, and networks, has addressed some of the challenges related to consolidation, space

More information

ActiveScale Erasure Coding and Self Protecting Technologies

ActiveScale Erasure Coding and Self Protecting Technologies WHITE PAPER AUGUST 2018 ActiveScale Erasure Coding and Self Protecting Technologies BitSpread Erasure Coding and BitDynamics Data Integrity and Repair Technologies within The ActiveScale Object Storage

More information

Network Edge Innovation With Virtual Routing

Network Edge Innovation With Virtual Routing Independent market research and competitive analysis of next-generation business and technology solutions for service providers and vendors Network Edge Innovation With Virtual Routing A Heavy Reading

More information

MidoNet Scalability Report

MidoNet Scalability Report MidoNet Scalability Report MidoNet Scalability Report: Virtual Performance Equivalent to Bare Metal 1 MidoNet Scalability Report MidoNet: For virtual performance equivalent to bare metal Abstract: This

More information

Cloud Computing and Cloud Networking

Cloud Computing and Cloud Networking Cloud Computing and Cloud Networking Dr. Adel Nadjaran Toosi Cloud Computing and Distributed Systems (CLOUDS) Laboratory, School of Computing and Information Systems The University of Melbourne, Australia

More information

Self-Managing Network-Attached Storage

Self-Managing Network-Attached Storage 1 of 5 5/24/2009 10:52 PM ACM Computing Surveys 28(4es), December 1996, http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a209-gibson/. Copyright 1996 by the Association for Computing Machinery,

More information

Casa Systems Axyom Multiservice Router

Casa Systems Axyom Multiservice Router Solution Brief Casa Systems Axyom Multiservice Router Solving the Edge Network Challenge To keep up with broadband demand, service providers have used proprietary routers to grow their edge networks. Cost

More information

Accelerating SDN and NFV Deployments. Malathi Malla Spirent Communications

Accelerating SDN and NFV Deployments. Malathi Malla Spirent Communications Accelerating SDN and NFV Deployments Malathi Malla Spirent Communications 2 Traditional Networks Vertically integrated Closed, proprietary Slow innovation 3 Infinite Complexity of Testing Across virtual

More information

Programmable Software Switches. Lecture 11, Computer Networks (198:552)

Programmable Software Switches. Lecture 11, Computer Networks (198:552) Programmable Software Switches Lecture 11, Computer Networks (198:552) Software-Defined Network (SDN) Centralized control plane Data plane Data plane Data plane Data plane Why software switching? Early

More information

Software Defined Networking

Software Defined Networking Software Defined Networking Jennifer Rexford COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101 http://www.cs.princeton.edu/courses/archive/spr12/cos461/ The Internet: A Remarkable

More information

Policy-based networking. CSU CS Fall 2017 Instructor: Lorenzo De Carli

Policy-based networking. CSU CS Fall 2017 Instructor: Lorenzo De Carli Policy-based networking CSU CS 557 - Fall 2017 Instructor: Lorenzo De Carli 1 Limitations of SDNs (and OpenFlow in particular) We have seen that scalability is a problem Generally solvable with: more resources,

More information